Sunteți pe pagina 1din 11

Wireless LAN or WIFI

Wireless local area network A WLAN, which links two or more computers using radio communication instead of wires. It is a IEEE 802.11 standard, It can serve 30 to 100 meters by mega bits per second. Here they can transfer through Frames. Hand off method

IEEE 802.11 WLAN ACTIVITIES


802.11 802.11b 802.11e 802.11f

802.11g
802.11i 802.11j 802.11k

802.11m
802.11n 802.11p 802.11r 802.11s

:5 GHz, 54 Mbps : 2.4 GHz, 11 Mbps : Quality of Service (QoS) : Inter-Access Point Protocol (IAPP) : 2.4 GHz, 54 Mbps : Security Ratified | WPAv2 Draft 9 : Japan 5 GHz Channels (4.9-5.1 GHz) : Measurement : Maintenance : High Throughput : Wireless Access for Vehicular Environment : Public WLAN Fast Roaming : Mesh Networking

802.11i std
It is a new standard for defining network wireless

security AES-advanced encryption system Authentication, encryption, key management strategies

MAC
If two devices transmit at the same time, their signals

will collide, becoming unreadable. Media access control(MAC) methods manage when devices transmit so that only one device transmits at a time. Media Access Control use two methods CSMA/CA used in Transport for Collision Avoidance. RTS/CTS

CSMA/CA
If the time since the last transmission is less than a

critical value, the station sets a random timer and waits. If there is no traffic at the end of the waiting time, the station sends. If there is traffic, CSMA starts over again. Receiver sends back an ACK When the Packet is Transmitted Properly else ask to resend the Frame using csma/ca it is Reliable Protocol.

RTS/CTS
Devices that ready to transmit may send RTS (Ready to

send)message to Wireless Access Point. Then it Broadcast the CTS (clear to send) message to the station those who send RTS message. Other station hearing CTS must wait

802.11 Security Standards


Wired Equivalent Privacy(wep) It is based on the RC4 symmetric key encryption algorithm Every one share same secret key .Easily crack WEP within 10 mins . It is never used in Corporations. Security was in crisis(disaster) or danger.

Wireless Protected Access


Access point does all authentication and key

management. Pre Shared Key mode If the pre-shared key is weak, it is easily cracked and Pass phrases are used to generate keys must be at least 20 characters long. 802.11i offers stronger security than WEP. WEP operates in only one mode: shared key WPA and 802.11i operate in both personal mode and enterprise mode

Remote Access Point Management


It is Placed in Switch or Access Point.
It is used for notification of immediate failures in the

network. Continuous quality Monitoring. Take suitable actions automatically . Ability to forward software updates out to all APs or WLAN switches

Advantages of 802.11
Mobility Productivity is very high

Deployment is also very easy


Expandability Cost is also very less

Disadvantages
Speed
Reliability Range

Security

S-ar putea să vă placă și